{"id":1614,"date":"2021-02-23T13:59:35","date_gmt":"2021-02-23T19:59:35","guid":{"rendered":"http:\/\/blogs.luc.edu\/uiso\/?p=1614"},"modified":"2021-02-23T13:59:35","modified_gmt":"2021-02-23T19:59:35","slug":"past-newsletters","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/uiso\/past-newsletters\/","title":{"rendered":"Past Newsletters"},"content":{"rendered":"<table style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 28.8678%;text-align: center\">Date Published<\/td>\n<td style=\"width: 26.838%;text-align: center\">Topic<\/td>\n<td style=\"width: 44.2941%;text-align: center\">Link<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"border-collapse: collapse;width: 100%;height: 384px\">\n<tbody>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.923%;text-align: left;height: 24px\">May 2023<\/td>\n<td style=\"width: 26.7098%;text-align: left;height: 24px\">Shoulder Surfing<\/td>\n<td style=\"width: 44.3671%;text-align: left;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2023\/05\/2023-May-UISO-Newsletter.pdf\">UISO Newsletter May 2023<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.923%;text-align: left;height: 24px\">January 2023<\/td>\n<td style=\"width: 26.7098%;text-align: left;height: 24px\">Recognizing and Reporting Phishing<\/td>\n<td style=\"width: 44.3671%;text-align: left;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2023\/01\/2023-January-UISO-Newsletter.pdf\">UISO Newsletter January 2023<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.923%;text-align: left;height: 24px\">September 2022<\/td>\n<td style=\"width: 26.7098%;text-align: left;height: 24px\">Key Benefits of Using a Password Manager<\/td>\n<td style=\"width: 44.3671%;text-align: left;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2022\/09\/2022-September-UISO-Newsletter.pdf\">UISO Newsletter September 2022 <\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.923%;text-align: left;height: 24px\">May 2022<\/td>\n<td style=\"width: 26.7098%;text-align: left;height: 24px\">How to Spot a Job Scam<\/td>\n<td style=\"width: 44.3671%;text-align: left;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2022\/05\/2022-May-UISO-Newsletter.pdf\">UISO Newsletter May 2022<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.923%;height: 24px;text-align: left\">December 2021<\/td>\n<td style=\"width: 26.7098%;height: 24px;text-align: left\">How to Spot a Fake Conference<\/td>\n<td style=\"width: 44.3671%;height: 24px;text-align: left\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/12\/2021-December-UISO-Newsletter.pdf\">UISO Newsletter December 2021 <\/a><\/td>\n<\/tr>\n<tr style=\"height: 48px\">\n<td style=\"width: 28.923%;height: 48px\">May 2021<\/td>\n<td style=\"width: 26.7098%;height: 48px\">6 Zoom Tips to Make Your Meetings More Secure<\/td>\n<td style=\"width: 44.3671%;height: 48px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/2021-May-UISO_Newsletter.pdf\">2021 May UISO_Newsletter<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.923%;height: 24px\">October 2020<\/td>\n<td style=\"width: 26.7098%;height: 24px\">Identity Theft, Working from Home, and Cyber Security Awareness Month<\/td>\n<td style=\"width: 44.3671%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_102020.pdf\">UISO_Newsletter_102020<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.923%;height: 24px\">August 2020<\/td>\n<td style=\"width: 26.7098%;height: 24px\">Multi-Factor Authentication, Coronavirus Phishing, and LastPass<\/td>\n<td style=\"width: 44.3671%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_082020.pdf\">UISO_Newsletter_082020<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.923%;height: 24px\">May 2020<\/td>\n<td style=\"width: 26.7098%;height: 24px\">Securing Your Home Workstation, Coronavirus Phishing Emails, and LastPass<\/td>\n<td style=\"width: 44.3671%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_052020.pdf\">UISO_Newsletter_052020<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.923%;height: 24px\">February 2020<\/td>\n<td style=\"width: 26.7098%;height: 24px\">LastPass and Multi-Factor Authentication<\/td>\n<td style=\"width: 44.3671%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_022020.pdf\">UISO_Newsletter_022020<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.923%;height: 24px\">September 2019<\/td>\n<td style=\"width: 26.7098%;height: 24px\">Privacy, Social Media, and Wi-Fi<\/td>\n<td style=\"width: 44.3671%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_092019.pdf\">UISO_Newsletter_092019<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.923%;height: 24px\">August 2019<\/td>\n<td style=\"width: 26.7098%;height: 24px\">LastPass, MFA, DLP, and New Instruction\/Form Location<\/td>\n<td style=\"width: 44.3671%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_082019.pdf\">UISO_Newsletter_082019<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.923%;height: 24px\">January 2019<\/td>\n<td style=\"width: 26.7098%;height: 24px\">Hacking and Phishing<\/td>\n<td style=\"width: 44.3671%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_012019.pdf\">UISO_Newsletter_012019<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.923%;height: 24px\">October 2018<\/td>\n<td style=\"width: 26.7098%;height: 24px\">Phishing, Tips, and Upcoming Info Sessions<\/td>\n<td style=\"width: 44.3671%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_102018-1.pdf\">UISO_Newsletter_102018<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.923%;height: 24px\">July 2018<\/td>\n<td style=\"width: 26.7098%;height: 24px\">Phishing, Passwords, and Loyola Aware<\/td>\n<td style=\"width: 44.3671%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_072018.pdf\">UISO_Newsletter_072018<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"border-collapse: collapse;width: 100%;height: 240px\">\n<tbody>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.7982%;height: 24px\">April 2018<\/td>\n<td style=\"width: 26.7573%;height: 24px\">Social Media and Loyola Aware<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_042018.pdf\">UISO_Newsletter_042018<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.7982%;height: 24px\">October 2017<\/td>\n<td style=\"width: 26.7573%;height: 24px\">Social Media and Loyola Aware<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_102017.pdf\">UISO_Newsletter_102017<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.7982%;height: 24px\">March 2017<\/td>\n<td style=\"width: 26.7573%;height: 24px\">FERPA<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_032017.pdf\">UISO_Newsletter_032017<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.7982%;height: 24px\">Jan-Feb 2017<\/td>\n<td style=\"width: 26.7573%;height: 24px\">Data Privacy<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_012017.pdf\">UISO_Newsletter_012017<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.7982%;height: 24px\">November 2016<\/td>\n<td style=\"width: 26.7573%;height: 24px\">Phishing<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_112016.pdf\">UISO_Newsletter_112016<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.7982%;height: 24px\">July-Oct 2016<\/td>\n<td style=\"width: 26.7573%;height: 24px\">Social Networking<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_102016.pdf\">UISO_Newsletter_102016<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.7982%;height: 24px\">June 2016<\/td>\n<td style=\"width: 26.7573%;height: 24px\">Privacy<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_062016.pdf\">UISO_Newsletter_062016<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.7982%;height: 24px\">May 2016<\/td>\n<td style=\"width: 26.7573%;height: 24px\">The Cloud and File Sharing<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_052016.pdf\">UISO_Newsletter_052016<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.7982%;height: 24px\">April 2016<\/td>\n<td style=\"width: 26.7573%;height: 24px\">Indicators of Hacking and the Human Sensor<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_042016.pdf\">UISO_Newsletter_042016<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.7982%;height: 24px\">March 2016<\/td>\n<td style=\"width: 26.7573%;height: 24px\">Passwords and Password Managers<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_032016.pdf\">UISO_Newsletter_032016<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"border-collapse: collapse;width: 100%;height: 240px\">\n<tbody>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">February 2016<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Mobile Device Security and Malware<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_022016.pdf\">UISO_Newsletter_022016<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">January 2016<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Browsing Security and Data Privacy Day<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_012016.pdf\">UISO_Newsletter_012016<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">December 2015<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Email Security and Spear Phishing<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_122015.pdf\">UISO_Newsletter_122015<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">November 2015<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Social Engineering and Loyola Aware<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_112015.pdf\">UISO_Newsletter_112015<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">Sep-Oct 2015<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Loyola Aware, You Are the Target, and Host Firewalling<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_102015.pdf\">UISO_Newsletter_102015<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">August 2015<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Physical Security, DMCA, and the PCI DSS<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_082015.pdf\">UISO_Newsletter_082015<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">June-July 2015<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Anti-virus, Hardening Your Computer, and Social Engineering<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_072015.pdf\">UISO_Newsletter_072015<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">April-May 2015<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Adaptive Authentication, Misconceptions, and Mobile Phones<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_042015.pdf\">UISO_Newsletter_042015<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">March 2015<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Backups, Two-Factor Authentication, and Open Wi-Fi<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_032615-1.pdf\">UISO_Newsletter_032615<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">Jan-Feb 2015<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Cloud Storage and Online Harrassment<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_021615-1.pdf\">UISO_Newsletter_021615<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table style=\"border-collapse: collapse;width: 100%;height: 120px\">\n<tbody>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">November 2014<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Why All These Policies?<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_112014.pdf\">UISO_Newsletter_112014<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">October 2014<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Cyber Security Awareness<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_102014.pdf\">UISO_Newsletter_102014<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">September 2014<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Physical Data Security<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_092014.pdf\">UISO_Newsletter_092014<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">August 2014<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Social Engineering<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_082014-1.pdf\">UISO_Newsletter_082014<\/a><\/td>\n<\/tr>\n<tr style=\"height: 24px\">\n<td style=\"width: 28.5714%;height: 24px\">July 2014<\/td>\n<td style=\"width: 26.9841%;height: 24px\">Email Security<\/td>\n<td style=\"width: 44.4444%;height: 24px\"><a href=\"https:\/\/blogs.luc.edu\/uiso\/wp-content\/uploads\/2021\/02\/UISO_Newsletter_072014.pdf\">UISO_Newsletter_072014<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Date Published Topic Link May 2023 Shoulder Surfing UISO Newsletter May 2023 January 2023 Recognizing and Reporting Phishing UISO Newsletter January 2023 September 2022 Key Benefits of Using a Password Manager UISO Newsletter September 2022 May 2022 How to Spot a Job Scam UISO Newsletter May 2022 December 2021 How to Spot a Fake Conference [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1614","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/comments?post=1614"}],"version-history":[{"count":0,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/1614\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/media?parent=1614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/categories?post=1614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/tags?post=1614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}